Cyber Safety

123456789101112131415161718
Across
  1. 3. Practices to ensure secure and responsible internet use
  2. 5. A copy of important data stored separately for recovery
  3. 7. Regular software improvements to fix security vulnerabilities
  4. 10. Manipulating people to gain confidential information
  5. 13. Software designed to detect and remove malicious programs
  6. 14. The process of verifying a user's identity
  7. 16. When data is accessed or exposed without permission
  8. 17. A fraudulent attempt to obtain sensitive information
  9. 18. A person who gains unauthorized access to systems
Down
  1. 1. A type of malicious software that can infect a computer
  2. 2. Malicious software designed to harm or exploit systems
  3. 4. A program that secretly gathers information about a user
  4. 6. A tool that stores and encrypts login credentials
  5. 8. Protecting personal information from unauthorized access
  6. 9. A wireless network that should be secured with a strong password
  7. 11. When someone illegally uses your personal information
  8. 12. The process of converting information into a secure code
  9. 15. An extra layer of security requiring two forms of verification